Skip to content

Support reading secrets in K8s agent manifest #24143

@mukeshelastic

Description

@mukeshelastic

Beats on K8s were able to read sensitive data like credentials from secrets to prevent these credentials or any other sensitive data in plain text in the config files. We need to provide similar experience on agent. For example, users can create secrets on command line and then refer it in yaml files from k8s secrets store.

cloud_id=test-cloud-id
cloud_auth=testusername:test-cloud-id-password
kubectl create secret generic cloud-secret --from-literal=cloud-id=test-cloud-id --from-literal=cloud-auth=testusername:test-cloud-id-password

  valueFrom:
        secretKeyRef:
          name: cloud-secret
          key: cloud-id

We need the agent manifest support reading from K8s secrets.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions